First published: Tue Feb 14 2023(Updated: )
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass [SPL safeguards for risky commands](https://docs.splunk.com/Documentation/Splunk/latest/Security/SPLsafeguards) using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser. The vulnerability affects instances with Splunk Web enabled.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.13 | |
Splunk Splunk | >=8.2.0<8.2.10 | |
Splunk Splunk | >=9.0.0<9.0.4 | |
Splunk Splunk Cloud Platform | <9.0.2209.3 | |
>=8.1.0<8.1.13 | ||
>=8.2.0<8.2.10 | ||
>=9.0.0<9.0.4 | ||
<9.0.2209.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22934 is a vulnerability in Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4 that allows a search to bypass SPL safeguards using a saved search job.
You can check if your Splunk Enterprise version is affected by CVE-2023-22934 by comparing it to the affected versions, which are below 8.1.13, 8.2.10, and 9.0.4.
CVE-2023-22934 has a severity rating of high.
To fix CVE-2023-22934, you should upgrade your Splunk Enterprise version to 8.1.13, 8.2.10, or 9.0.4.
You can find more information about CVE-2023-22934 on the Splunk advisory page at https://advisory.splunk.com/advisories/SVD-2023-0204 and the Splunk research page at https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd.